Analysis
-
max time kernel
37s -
max time network
10s -
platform
windows7_x64 -
resource
win7v20210408 -
submitted
15-04-2021 15:57
Static task
static1
Behavioral task
behavioral1
Sample
d6904948ae99d7bf84e6af9a978c3ae6.dll
Resource
win7v20210408
windows7_x64
0 signatures
0 seconds
General
-
Target
d6904948ae99d7bf84e6af9a978c3ae6.dll
-
Size
666KB
-
MD5
d6904948ae99d7bf84e6af9a978c3ae6
-
SHA1
a272ccd04db93604874c8606e4f41ad8bb212540
-
SHA256
938f890613dc8526bb828c3de5d5c612b7c13515062fb6ca15f8abc1424f2835
-
SHA512
dbae64e1d607c23e5779fcd3da5e8e1f8348d324b68097758d07ca31a7778d5a22ae701d5999d324063095b61c30cc34a8ca2754dc878d4f87e94cbe72f387b6
Malware Config
Extracted
Family
zloader
Botnet
nut
Campaign
13/04
C2
https://jiaayanu.com/post.php
https://investinszeklerland.eu/post.php
https://iqs-sac.com/post.php
https://jciems.in/post.php
https://jinnahofficersschool.com/post.php
https://kancagh.com/post.php
rc4.plain
rsa_pubkey.plain
Signatures
-
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
rundll32.exedescription pid process target process PID 748 wrote to memory of 1864 748 rundll32.exe rundll32.exe PID 748 wrote to memory of 1864 748 rundll32.exe rundll32.exe PID 748 wrote to memory of 1864 748 rundll32.exe rundll32.exe PID 748 wrote to memory of 1864 748 rundll32.exe rundll32.exe PID 748 wrote to memory of 1864 748 rundll32.exe rundll32.exe PID 748 wrote to memory of 1864 748 rundll32.exe rundll32.exe PID 748 wrote to memory of 1864 748 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d6904948ae99d7bf84e6af9a978c3ae6.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:748 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d6904948ae99d7bf84e6af9a978c3ae6.dll,#12⤵PID:1864
-